The IoT hacker's handbook a practical guide to hacking the internet of things
By: Gupta, Aditya
Material type: BookPublisher: [New York] : Apress, ©2019.Description: xviii, 320 pages : black and white illustrations ; 24 cm.ISBN: 9781484243008; 9781484242995Subject(s): Internet of things -- Security measures | HackingDDC classification: 004.678 GU LO Online resources: Location Map
Summary:
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
Item type | Home library | Call number | Status | Notes | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 004.678 GU LO (Browse shelf) | Available | Jan2020 | T0063414 |
Total holds: 0
, Shelving location: Main Collection Close shelf browser
004.678 CR IN Internet measurement : | 004.678 FU ND Fundamentals of Internet of Things for non-engineers | 004.678 GI HO How the web was born : | 004.678 GU LO The IoT hacker's handbook | 004.678 HA LO Look who's watching : | 004.678 HO WI How is the internet changing the way you think? : | 004.678 IN TE Internet of things (IoT) : |
Includes index.
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.